HomeSort by: relevance | last modified time | path
    Searched defs:reconnect (Results 1 - 12 of 12) sorted by relevancy

  /src/tests/rump/rumpkern/
t_sp.sh 66 # test_case reconnect reconnect
67 test_case_skip reconnect kern/55304 "leftover rump_server"
148 reconnect() function
169 atf_add_test_case reconnect
  /src/usr.sbin/syslogd/
tls.h 62 /* reconnect to lost server after n sec (initial value) */
139 unsigned reconnect; /* seconds between reconnects */ member in struct:tls_conn_settings
  /src/sys/dev/usb/
uhub.c 539 int change, status, reconnect, rescan; local
602 reconnect = up->up_reattach;
608 if (PORTSTAT_ISSET(sc, port) || reconnect) {
622 dev, port, status, change, reconnect);
623 if (!change && !reconnect) {
687 if (!reconnect && !(change & UPS_C_CONNECT_STATUS)) {
  /src/sbin/fsck_msdos/
dir.c 922 * Try to reconnect a FAT chain into dir
929 reconnect(int dosfs, struct bootblock *boot, struct fatEntry *fat, cl_t head) function
935 if (!ask(1, "Reconnect"))
  /src/crypto/external/bsd/heimdal/dist/lib/kadm5/
ipropd_slave.c 715 time_t reconnect; local
819 krb5_appdefault_time(context, config_name, NULL, "reconnect-min",
821 krb5_appdefault_time(context, config_name, NULL, "reconnect-max",
823 krb5_appdefault_time(context, config_name, NULL, "reconnect-backoff",
825 reconnect = reconnect_min;
850 if (elapsed < reconnect) {
851 time_t left = reconnect - elapsed;
869 reconnect = reconnect_min;
1056 reconnect += backoff;
1057 if (reconnect > reconnect_max)
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa.h 32 void (*reconnect)(void *ctx); member in struct:wpa_sm_ctx
  /src/external/bsd/wpa/dist/hostapd/
hostapd_cli.c 71 " -r try to reconnect when client socket is "
2026 printf("Connection to hostapd lost - trying to reconnect\n");
2214 int reconnect = 0; local
2250 reconnect = 1;
2294 if (!interactive && !reconnect) {
2314 if (reconnect && action_file && ctrl_ifname) {
  /src/external/ibm-public/postfix/dist/src/posttls-finger/
posttls-finger.c 61 /* for the new server, and the reconnect is repeated up to a maximum
208 /* The default is \fBroutine,certmatch\fR. After a reconnect,
213 /* determines the maximum number of reconnect attempts to use with
237 /* With a cacheable TLS session, disconnect and reconnect after \fIdelay\fR
474 int reconnect; /* -r option */ member in struct:STATE
486 int pass; /* Pass number, 2 for reconnect */
1732 /* Reused on reconnect */
1733 if (state->reconnect <= 0) {
1775 if (state->tlsproxy_mode == 0 && state->reconnect > 0) {
1783 state->reconnect = 0
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
s_client.c 553 {"reconnect", OPT_RECONNECT, '-',
821 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local
1307 reconnect = 5;
2751 if (!reconnect)
2755 if (reconnect) {
2756 reconnect--;
2758 "drop connection and then reconnect\n");
  /src/crypto/external/bsd/openssl.old/dist/apps/
s_client.c 641 {"reconnect", OPT_RECONNECT, '-',
917 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local
1386 reconnect = 5;
2800 if (!reconnect)
2804 if (reconnect) {
2805 reconnect--;
2807 "drop connection and then reconnect\n");
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_cli.c 55 static int reconnect = 0; variable
95 " -r = try to reconnect when client socket is disconnected.\n"
1712 return wpa_ctrl_command(ctrl, "RECONNECT");
3564 "= disconnect and wait for reassociate/reconnect command before\n"
3566 { "reconnect", wpa_cli_cmd_reconnect, NULL,
4474 if (!reconnect)
4623 "reconnect\n");
4666 "reconnect\n");
4667 if (reconnect) {
4687 "reconnect\n")
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
s_client.c 690 { "reconnect", OPT_RECONNECT, '-',
970 int reconnect = 0, verify = SSL_VERIFY_NONE, vpmtouched = 0; local
1492 reconnect = 5;
2998 if (!reconnect)
3002 if (reconnect) {
3003 reconnect--;
3005 "drop connection and then reconnect\n");
3922 BIO_printf(bio_err, " {reconnect}: Reconnect to the peer\n");
4069 } else if (OPENSSL_strcasecmp(cmd_start, "reconnect") == 0)
    [all...]

Completed in 54 milliseconds